A potential security vulnerability in the Intel® Single Event API (SEAPI) software may allow escalation of privilege. Intel is not releasing updates to mitigate this potential vulnerability and has issued a Product Discontinuation Notice for the Intel® SEAPI software.
CVEID: CVE-2022-26844
Description: Insufficiently protected credentials in the installation binaries for Intel® SEAPI in all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H****
CVEID: CVE-2022-26344
Description: Incorrect default permissions in the installation binaries for Intel® SEAPI all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H****
CVEID: CVE-2022-26374
Description: Uncontrolled search path in the installation binaries for Intel® SEAPI all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H****
Intel® SEAPI, all versions.
Intel has issued a Product Discontinuation Notice for Intel® SEAPI and recommends that users of Intel® SEAPI uninstall or discontinue use at their earliest convenience.
Github: <https://github.com/intel/IntelSEAPI>
These issues were found externally.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.